US6377286B1 - Temporal desktop agent - Google Patents

Temporal desktop agent Download PDF

Info

Publication number
US6377286B1
US6377286B1 US09/006,238 US623898A US6377286B1 US 6377286 B1 US6377286 B1 US 6377286B1 US 623898 A US623898 A US 623898A US 6377286 B1 US6377286 B1 US 6377286B1
Authority
US
United States
Prior art keywords
file
files
user
icon
criteria
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
US09/006,238
Inventor
Roland M. Hochmuth
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hewlett Packard Development Co LP
Original Assignee
Hewlett Packard Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett Packard Co filed Critical Hewlett Packard Co
Priority to US09/006,238 priority Critical patent/US6377286B1/en
Assigned to HEWLETT-PACKARD COMPANY reassignment HEWLETT-PACKARD COMPANY ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HOCHMUTH, ROLAND M.
Assigned to HEWLETT-PACKARD COMPANY reassignment HEWLETT-PACKARD COMPANY MERGER (SEE DOCUMENT FOR DETAILS). Assignors: HEWLETT-PACKARD COMPANY
Priority to US10/077,387 priority patent/US20020075319A1/en
Application granted granted Critical
Publication of US6377286B1 publication Critical patent/US6377286B1/en
Assigned to HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. reassignment HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HEWLETT-PACKARD COMPANY
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons

Definitions

  • This invention relates generally to data processing. More particularly this invention relates to graphical user interfaces. Even more particularly, this invention relates to a system and method of automatically managing the display of objects in a graphical user interface.
  • Graphical user interfaces have improved the ease with which many tasks may be accomplished on a computer.
  • a user would have to remember the file name and path of the application, and the arguments given to that application in order to execute it.
  • the user need only activate an icon that represents the application and select the arguments when prompted to execute that application. Since the properties assigned to the graphic icon link it to the executable file and specify its complete directory path, there is no need to memorize that information.
  • Microsoft Corporation's WINDOWSTM and Apple Computer, Inc.'s MacIntoshTM operating systems are examples of successful graphical user interfaces.
  • graphical user interfaces use a desktop metaphor as a working environment.
  • desktop metaphor the user interacts with icons and other graphical objects as if they resided on a real desktop.
  • the user may add, remove, and reposition these graphical objects by using a mouse, or other pointing device.
  • the user may use the pointing device to select graphical objects that will run certain programs, or edit certain files.
  • a shortcoming of this solution is that a frequently used program or file may not be represented on the computer desktop. This forces the user to use less efficient means that require many keystrokes or mouse clicks each time that frequently used program or file is accessed.
  • Another shortcoming of this solution is that rarely used programs or files may be represented on the computer desktop. This contributes to clutter and visual confusion making it more likely that a user will not change the representations on the computer desktop to more accurately reflect commonly used programs and files.
  • a part of the operating system, or a part of an application, or a separate low priority process continually runs in the background of a computer and monitors the accessing of programs and files initiated by the user through a graphical user interface (GUI).
  • GUI graphical user interface
  • a user accesses a program to execute it, or otherwise accesses a file via the GUI, that event is logged in a desktop event log.
  • the desktop event log includes a reference to the program, or file, and the date and time of the access. If the number of accesses exceeds a specified threshold over a specified period of time, a graphical object representing that program, or file will be automatically or semi-automatically placed on the computer desktop. The location of the object may be determined automatically, or be chosen by the user.
  • a part of the operating system, or a part of an application, or a separate low priority process continually runs in the background and monitors the usage of graphical objects that are on the computer desktop.
  • a particular object is not used for a specified amount of time, or not used frequently enough over a specified period of time, that object is removed from the computer desktop.
  • the user may be queried before removal to determine if the object should be retained on the computer desktop.
  • an object When an object is removed, it may be completely removed, or merely relocated to a temporary location.
  • the temporary location may be represented on the computer desktop by a graphical object, called a stack, that is analogous to a stack of papers accumulating on a real desktop.
  • the stack provides a convenient location for the user to view objects that have been removed from the computer desktop.
  • FIG. 1 is a block diagram of a computer suitable for use in implementing the present invention.
  • FIG. 2 is a block diagram showing the interconnection of some of the principle components inside the processor chassis of FIG. 1 .
  • FIG. 3 illustrates the appearance of a computer desktop metaphor as used by a graphical user interface.
  • FIG. 4 is a flow chart summarizing the steps to log file accesses initiated by the user's interaction with a graphical user interface.
  • FIG. 5A is a flow chart that summarizes the steps to automatically, or semi-automatically create a shortcut for frequently accessed files.
  • FIG. 5B is a flow chart that summarizes the steps to automatically, or semi-automatically create a shortcut for frequently accessed files at the time they are accessed by the user via the graphical user interface.
  • FIG. 6 is a flow chart that summarizes the steps to automatically, or semi-automatically remove infrequently used objects from the computer desktop.
  • FIG. 7 illustrates an example of a dialog box that can be used to interrogate the user whether or not a particular object should be removed from the computer desktop.
  • FIG. 1 illustrates a computer 100 that is suitable for implementing the present invention.
  • Computer 100 includes a chassis 102 containing one or more circuit boards (not shown), a floppy drive 112 , and a hard drive 114 .
  • a representative block diagram of the elements included on the circuit boards inside chassis 102 is shown in FIG. 2.
  • a central processing unit (CPU) 210 is connected to a system bus 214 .
  • System bus 214 also connects to memory 208 that includes both read only memory (ROM) and random access memory (RAM); a display interface 202 that controls monitor 106 to display images on screen 108 ; a hard drive and floppy drive interface 204 that controls hard drive 114 and floppy drive 112 ; a serial mouse port 206 that communicates with mouse 110 to allow the user to manipulate a cursor or other graphical objects; and a keyboard interface 212 that communicates with keyboard 104 to allow the user to enter text or keystroke commands.
  • ROM read only memory
  • RAM random access memory
  • FIG. 3 shows the appearance of screen 108 with one possible graphical user interface displaying a desktop metaphor.
  • the GUI displays a computer desktop window 300 with a menu bar 301 .
  • icons are displayed that each represent an object. For example icons 302 , 303 , 304 , 305 , 306 , 307 , and 308 are shown.
  • icon 308 represents an object called DEMO that is associated with a word processing program.
  • object DEMO represents a file containing a document from a word processing program.
  • the file represented by object DEMO may be opened, for example, by using mouse 110 to place cursor 310 over icon 308 , and depressing a button on mouse 110 twice in quick succession. The GUI would then take the steps to load and execute the word processing program and to tell the word processing program to use the file represented by the object DEMO.
  • GUIs such as Microsoft WINDOWSTM
  • Many GUIs include the ability to create an object known as a shortcut and to place that object on the computer desktop.
  • Shortcuts are quick ways to get to programs and files that are used often. For example, if the user creates a shortcut to run a word processor, an icon representing that word processor would appear on the computer desktop displayed on the screen. Then, to run the word processor, the user just presses a mouse button twice while the cursor is over that icon, and it will run the word processor. Or, to edit a particular file in the word processor, the user may drag and drop an icon representing that file onto the icon representing the word processor, and the word processor will start up and load that file. The user may also create a shortcut representing the file to be edited. Then, for example, when the mouse 110 is used to place cursor 310 over the icon representing the shortcut to the file, and a button on the mouse 110 is depressed twice in quick succession, the program for editing that type of file will be executed and that file loaded.
  • All of these actions involve some type of file access. For example, to edit a file, that file is accessed so that it may be loaded by the appropriate program. Likewise, when a shortcut icon is double-clicked on, or when an icon representing another object is dropped on that icon, the program or file represented by that shortcut icon is accessed so that the appropriate action may be taken. Even when an object simply represents a program executing that program can be viewed as a file access since a program is merely a file containing code that is executed by the computer 100 , and that file must be accessed by the operating system to load and execute that program. Furthermore, GUI actions that are more involved and less convenient, such as running a program by choosing it from a pop-up menu involve the same types of files accesses.
  • files should be interpreted to include both program (or executable) files as well as data, or other types of files. Additionally, file accesses should be interpreted to include both accessing program files to execute them as well as accessing data, program, or other types of files to perform other operations using those files.
  • FIG. 4 is a flow chart that summarizes the steps that may be used to log file accesses that are initiated by the user's interaction with the GUI. All, or part, of these steps may be done by the GUI, the operating system, a low-level process running in the background, an application, or any combination of the preceding.
  • a step 400 the files accessed via the graphical user interface are monitored.
  • a step 402 a reference to each file accessed, is stored in a log along with a time stamp indicating when the event occurred.
  • This desktop event log may be stored in memory or on a disk.
  • the desktop event log may be kept in any format including a proprietary binary format, or a textual form.
  • FIG. 5A is a flow chart that summarizes the steps that may be used to automatically, or semi-automatically create a shortcut for frequently accessed files and place a representation of that shortcut on the computer desktop. All, or part, of these steps may be done by the GUI, the operating system, a low-level process running in the background, an application, or any combination of the preceding.
  • a step 502 an interval is waited. This interval may be measured in time units, or as a predetermined number of GUI commands. It may also be desirable to wait until the computer 100 is mostly idle so that the process to automatically create a shortcut does not slow the execution of other computer tasks.
  • the desktop event log is examined to see if a particular file meets the criteria for creating a shortcut.
  • a particular file has been accessed by the user through the GUI more than a specified threshold number of times within a specified period, it meets the criteria for creating a shortcut.
  • the specified period may be measured in time units, or in GUI commands.
  • Examining the desktop event log may be accomplished by successively looking at portions of the log that represent the specified period and then counting the number of occurrences of each file to see if there are more than the specified threshold number of occurrences of that file in that portion of the desktop event log.
  • the specified period, and the specified threshold number of times a file must occur in the desktop event log within that specified period before it is considered for the creation of a shortcut may both be initially set to a default values. However, it is desirable to let the user adjust those values through a variety of means that are well known in the art.
  • One such example is a “control panel” program that is used to set system parameters.
  • step 506 if no file meets the criteria for creating a shortcut, the process loops back to step 502 to wait. If a file meets the criteria, step 508 checks to see if a shortcut representing that file is already displayed on the computer desktop, or if it has been marked as non-temporal. If a shortcut representing that file is already displayed on the computer desktop, there is no reason to create another one and the process loops back to step 502 to wait. Furthermore, if that file is marked as non-temporal, then the process is not allowed to operate on this file so non-temporal files cannot be placed on the computer desktop by the process. Since the process cannot place a shortcut representing this file on the computer desktop, the process loops back to step 502 to wait.
  • a shortcut should be created for this file. This step is optional. It is desirable, however, to ask the user if a shortcut should be created so the user will not be surprised by the appearance of a new icon on the computer desktop, and to allow the user to avoid clutter on the computer desktop, and optionally to allow the user to position the icon on the computer desktop.
  • a step 512 if the user indicates that a shortcut should not be created, the process loops back to step 502 to wait. If the user indicates that a shortcut should be created, a shortcut is created and an icon representing the file is placed on the computer desktop in a step 514 . The process then loops back to step 502 to wait.
  • Files may be marked as temporal or non-temporal by the user through a variety of means well known in the art. For example, a default setting that marks all files ending with the “.EXE” as temporal could be used. This default could be overridden by a variety of means well known in the art such as a “properties” dialog box.
  • FIG. 5B is a flow chart that summarizes the steps that may be used to automatically, or semi-automatically create a shortcut for frequently accessed files at the time they are accessed by the user and place a representation of that shortcut on the computer desktop. All, or part, of these steps may be done by the GUI, the operating system, a low-level process running in the background, an application, or any combination of the preceding.
  • the process waits until a file is accessed by the user via the GUI.
  • the desktop event log is examined to see if that particular file meets the criteria for creating a shortcut. If that particular file has been accessed by the user through the GUI more than a specified threshold number of times within a specified period, it meets the criteria for creating a shortcut.
  • the specified period may be measured in time units, or in GUI commands. Examining the desktop event log may be accomplished by successively looking at portions of the log that represent the specified period and then counting the number of time that file occurs to see if there are more than the specified threshold number of occurrences of that file in that portion of the desktop event log. There are many other ways that are well known in art to examine the desktop event log to see if that particular file has been accessed more than a specified threshold number of times within a specified period.
  • the specified period, and the specified threshold number of times that the file must occur in the desktop event log within that specified period before it is considered for the creation of a shortcut may both be initially set to a default values. However, it is desirable to let the user adjust those values through a variety of means that are well known in the art.
  • One such example is a “control panel” program that is used to set system parameters.
  • step 507 if that file does not meet the criteria for creating a shortcut, the process loops back to step 503 to wait. If a file meets the criteria, step 508 checks to see if a shortcut representing that file is already displayed on the computer desktop, or if it has been marked as non-temporal. If a shortcut representing that file is already displayed on the computer desktop, there is no reason to create another one and the process loops back to step 503 to wait. Furthermore, if that file is marked as non-temporal, then the process is not allowed to operate on this file so non-temporal files cannot be placed on the computer desktop by the process. Since the process cannot place a shortcut representing this file on the computer desktop, the process loops back to step 503 to wait.
  • a shortcut should be created for this file. This step is optional. It is desirable, however, to ask the user if a shortcut should be created so the user will not be surprised by the appearance of a new icon on the computer desktop, and to allow the user to avoid clutter on the computer desktop, and optionally to allow the user to position the icon on the computer desktop.
  • a step 512 if the user indicates that a shortcut should not be created, the process loops back to step 503 to wait. If the user indicates that a shortcut should be created, a shortcut is created and an icon representing the file is placed on the computer desktop in a step 514 . The process then loops back to step 503 to wait.
  • FIG. 6 is a flow chart that summarizes the steps that may be used to automatically, or semi-automatically remove objects on the computer desktop that are infrequently used. All, or part, of these steps may be done by the GUI, the operating system, a low-level process running in the background, an application, or any combination of the preceding.
  • a step 602 an interval is waited. This interval may be measured in time units, as a predetermined number of GUI commands, or as a predetermined number of boot-ups or logins. It may also be desirable to wait until the computer 100 is mostly idle so that the process to remove items from the computer desktop does not slow the execution of other computer tasks.
  • an item that appears on the computer desktop is selected.
  • a step 606 the process checks to see if the item has been marked as non-temporal. If the item has been marked non-temporal, then it will not be removed from the computer desktop even if it has not been used in a long time and the process will proceed to a step 608 to see if this is the last item on the computer desktop to be considered for removal. If it is not the last item, the process proceeds to step 604 to select another item on the computer desktop to consider for removal.
  • step 610 checks the desktop event log, or some other usage information, to see if the last usage of that item was more than a specified threshold amount of time ago. This threshold amount of time may be measured in time units, as a predetermined number of GUI commands, or as a predetermined number of boot-ups or logins. If the item has been used more recently than the specified threshold amount of time, then the process proceeds to step 608 . If the item has not been used more recently than the threshold amount of time, then the process proceeds to step 612 where the user is asked if that item should be removed from the computer desktop completely, or removed from the computer desktop and placed in the stack. This step is optional.
  • This special location may contain many items that have been removed from the computer desktop.
  • This stack is analogous to a stack of papers that accumulate on a physical desktop.
  • An appropriate icon representing the stack may be displayed on the computer desktop to allow the user to easily access these items that have been removed from the computer desktop and to retrieve items from the stack and place them back on the computer desktop.
  • step 614 if the user indicated that the item should not be removed, the process loops back to step 608 . If the user indicated that the item should be removed, then in a step 616 , the process follows the user's instructions and removes the item completely, or places the item in the stack. If optional step 612 is not executed, step 616 would always be completed and the item would either be removed completely, or removed and placed in the stack depending on the desired default operation specified.
  • FIG. 7 illustrates an example of a dialog box 330 displayed on screen 108 that can be used to ask the user if an item should be removed from the computer desktop.
  • a graphical representation of the item as it is displayed on the computer desktop 702 is displayed along with text 704 that explains the choice the user needs to make.
  • the user may then choose to remove the item by positioning the cursor over the “YES” button 333 and depressing a mouse button.
  • the user may choose to keep the item on the computer desktop by positioning the cursor over the “NO” button 335 and depressing a mouse button.

Abstract

File accesses initiated by a graphical user interface are monitored. When the number of accesses exceeds a specified threshold number of times in less than a specified period of time, and that file is not already represented on the computer desktop, an icon representing that file may be placed on the computer desktop. The user may be queried to determine if an icon representing that file should be placed on the desktop. If a particular icon residing on the computer desktop has not been used more than a specified number of times is more than a specified period of time, that icon may be removed from the computer desktop. The user may be queried to determine if that icon should be removed from the computer desktop. That icon may also be relocated to a temporary location so that it may be easily accessed.

Description

BACKGROUND OF THE INVENTION
1. Field of the Invention
This invention relates generally to data processing. More particularly this invention relates to graphical user interfaces. Even more particularly, this invention relates to a system and method of automatically managing the display of objects in a graphical user interface.
2. Background of the Invention
Graphical user interfaces have improved the ease with which many tasks may be accomplished on a computer. In a traditional text-based user interface, a user would have to remember the file name and path of the application, and the arguments given to that application in order to execute it. In a graphical user interface, the user need only activate an icon that represents the application and select the arguments when prompted to execute that application. Since the properties assigned to the graphic icon link it to the executable file and specify its complete directory path, there is no need to memorize that information. Microsoft Corporation's WINDOWS™ and Apple Computer, Inc.'s MacIntosh™ operating systems are examples of successful graphical user interfaces.
Many of these graphical user interfaces use a desktop metaphor as a working environment. With a desktop metaphor, the user interacts with icons and other graphical objects as if they resided on a real desktop. The user may add, remove, and reposition these graphical objects by using a mouse, or other pointing device. Furthermore, the user may use the pointing device to select graphical objects that will run certain programs, or edit certain files.
Unfortunately, not all the programs and files are represented by graphical objects residing on the computer desktop. The large number of programs and files available to the user makes display of a graphical representation of each of them impractical. The computer desktop would be horribly cluttered and/or the graphical representations too small to convey any meaningful information about the program or file they represent.
The solution to this problem chosen by modern graphical user interfaces is to only represent a small number of frequently used programs or files on the computer desktop. The files and programs represented are initially chosen by the authors of the graphical user interface, but may be changed by the user. The rest of the programs and files accessible to the user must be selected through the use of less convenient means such as pull-down or pop-up menus, dialog boxes, and windows showing nested folders that represent a directory tree.
A shortcoming of this solution is that a frequently used program or file may not be represented on the computer desktop. This forces the user to use less efficient means that require many keystrokes or mouse clicks each time that frequently used program or file is accessed. Another shortcoming of this solution is that rarely used programs or files may be represented on the computer desktop. This contributes to clutter and visual confusion making it more likely that a user will not change the representations on the computer desktop to more accurately reflect commonly used programs and files.
Accordingly, there is a need in the art for a method and system of automatically creating and removing graphical objects from a computer desktop metaphor. Such a method should maintain the computer desktop such that it accurately reflects the files and programs being most frequently accessed by the user. Also, the system should give the user the ability to override its actions to account for personal taste. And finally, such a method should be intuitive and easy to use even for an unsophisticated user.
SUMMARY OF THE INVENTION
A part of the operating system, or a part of an application, or a separate low priority process, continually runs in the background of a computer and monitors the accessing of programs and files initiated by the user through a graphical user interface (GUI). When a user accesses a program to execute it, or otherwise accesses a file via the GUI, that event is logged in a desktop event log. The desktop event log includes a reference to the program, or file, and the date and time of the access. If the number of accesses exceeds a specified threshold over a specified period of time, a graphical object representing that program, or file will be automatically or semi-automatically placed on the computer desktop. The location of the object may be determined automatically, or be chosen by the user.
A part of the operating system, or a part of an application, or a separate low priority process, continually runs in the background and monitors the usage of graphical objects that are on the computer desktop. When a particular object is not used for a specified amount of time, or not used frequently enough over a specified period of time, that object is removed from the computer desktop. The user may be queried before removal to determine if the object should be retained on the computer desktop. When an object is removed, it may be completely removed, or merely relocated to a temporary location. The temporary location may be represented on the computer desktop by a graphical object, called a stack, that is analogous to a stack of papers accumulating on a real desktop. The stack provides a convenient location for the user to view objects that have been removed from the computer desktop.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a block diagram of a computer suitable for use in implementing the present invention.
FIG. 2 is a block diagram showing the interconnection of some of the principle components inside the processor chassis of FIG. 1.
FIG. 3 illustrates the appearance of a computer desktop metaphor as used by a graphical user interface.
FIG. 4 is a flow chart summarizing the steps to log file accesses initiated by the user's interaction with a graphical user interface.
FIG. 5A is a flow chart that summarizes the steps to automatically, or semi-automatically create a shortcut for frequently accessed files.
FIG. 5B is a flow chart that summarizes the steps to automatically, or semi-automatically create a shortcut for frequently accessed files at the time they are accessed by the user via the graphical user interface.
FIG. 6 is a flow chart that summarizes the steps to automatically, or semi-automatically remove infrequently used objects from the computer desktop.
FIG. 7 illustrates an example of a dialog box that can be used to interrogate the user whether or not a particular object should be removed from the computer desktop.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
FIG. 1 illustrates a computer 100 that is suitable for implementing the present invention. Computer 100 includes a chassis 102 containing one or more circuit boards (not shown), a floppy drive 112, and a hard drive 114. A representative block diagram of the elements included on the circuit boards inside chassis 102 is shown in FIG. 2. A central processing unit (CPU) 210 is connected to a system bus 214. System bus 214 also connects to memory 208 that includes both read only memory (ROM) and random access memory (RAM); a display interface 202 that controls monitor 106 to display images on screen 108; a hard drive and floppy drive interface 204 that controls hard drive 114 and floppy drive 112; a serial mouse port 206 that communicates with mouse 110 to allow the user to manipulate a cursor or other graphical objects; and a keyboard interface 212 that communicates with keyboard 104 to allow the user to enter text or keystroke commands. Although many other components of computer 100 are not shown, such components and their interconnection are well known to those of ordinary skill in the art. Accordingly, further details concerning the construction and composition of computer 100 and the circuit boards inside chassis 102 need not be disclosed with the present invention.
When the computer 100 is running, program instructions stored on a floppy disk in floppy drive 112, or on hard drive 114, or in memory 208 that comprise a graphical user interface (GUI) program are executed by CPU 210 causing the graphical elements that comprise the user's view of the graphical user interface to be displayed on screen 108. FIG. 3 shows the appearance of screen 108 with one possible graphical user interface displaying a desktop metaphor. The GUI displays a computer desktop window 300 with a menu bar 301. Inside window 300 icons are displayed that each represent an object. For example icons 302, 303, 304, 305, 306, 307, and 308 are shown. Each of these icons represent a file, a program, a shortcut, or a tool or some other type of computer functionality. For example, icon 308 represents an object called DEMO that is associated with a word processing program. In this case, object DEMO represents a file containing a document from a word processing program. The file represented by object DEMO may be opened, for example, by using mouse 110 to place cursor 310 over icon 308, and depressing a button on mouse 110 twice in quick succession. The GUI would then take the steps to load and execute the word processing program and to tell the word processing program to use the file represented by the object DEMO.
Many GUIs, such as Microsoft WINDOWS™, include the ability to create an object known as a shortcut and to place that object on the computer desktop. Shortcuts are quick ways to get to programs and files that are used often. For example, if the user creates a shortcut to run a word processor, an icon representing that word processor would appear on the computer desktop displayed on the screen. Then, to run the word processor, the user just presses a mouse button twice while the cursor is over that icon, and it will run the word processor. Or, to edit a particular file in the word processor, the user may drag and drop an icon representing that file onto the icon representing the word processor, and the word processor will start up and load that file. The user may also create a shortcut representing the file to be edited. Then, for example, when the mouse 110 is used to place cursor 310 over the icon representing the shortcut to the file, and a button on the mouse 110 is depressed twice in quick succession, the program for editing that type of file will be executed and that file loaded.
All of these actions involve some type of file access. For example, to edit a file, that file is accessed so that it may be loaded by the appropriate program. Likewise, when a shortcut icon is double-clicked on, or when an icon representing another object is dropped on that icon, the program or file represented by that shortcut icon is accessed so that the appropriate action may be taken. Even when an object simply represents a program executing that program can be viewed as a file access since a program is merely a file containing code that is executed by the computer 100, and that file must be accessed by the operating system to load and execute that program. Furthermore, GUI actions that are more involved and less convenient, such as running a program by choosing it from a pop-up menu involve the same types of files accesses. Accordingly, throughout the rest of this document, files should be interpreted to include both program (or executable) files as well as data, or other types of files. Additionally, file accesses should be interpreted to include both accessing program files to execute them as well as accessing data, program, or other types of files to perform other operations using those files.
FIG. 4 is a flow chart that summarizes the steps that may be used to log file accesses that are initiated by the user's interaction with the GUI. All, or part, of these steps may be done by the GUI, the operating system, a low-level process running in the background, an application, or any combination of the preceding. In a step 400, the files accessed via the graphical user interface are monitored. In a step 402, a reference to each file accessed, is stored in a log along with a time stamp indicating when the event occurred. This desktop event log may be stored in memory or on a disk. The desktop event log may be kept in any format including a proprietary binary format, or a textual form.
FIG. 5A is a flow chart that summarizes the steps that may be used to automatically, or semi-automatically create a shortcut for frequently accessed files and place a representation of that shortcut on the computer desktop. All, or part, of these steps may be done by the GUI, the operating system, a low-level process running in the background, an application, or any combination of the preceding. In a step 502, an interval is waited. This interval may be measured in time units, or as a predetermined number of GUI commands. It may also be desirable to wait until the computer 100 is mostly idle so that the process to automatically create a shortcut does not slow the execution of other computer tasks. In a step 504 the desktop event log is examined to see if a particular file meets the criteria for creating a shortcut. If a particular file has been accessed by the user through the GUI more than a specified threshold number of times within a specified period, it meets the criteria for creating a shortcut. The specified period may be measured in time units, or in GUI commands. Examining the desktop event log may be accomplished by successively looking at portions of the log that represent the specified period and then counting the number of occurrences of each file to see if there are more than the specified threshold number of occurrences of that file in that portion of the desktop event log. There are many other ways that are well known in art to examine the desktop event log to see if a particular file has been accessed more than a specified threshold number of times within a specified period.
The specified period, and the specified threshold number of times a file must occur in the desktop event log within that specified period before it is considered for the creation of a shortcut may both be initially set to a default values. However, it is desirable to let the user adjust those values through a variety of means that are well known in the art. One such example is a “control panel” program that is used to set system parameters.
In a step 506, if no file meets the criteria for creating a shortcut, the process loops back to step 502 to wait. If a file meets the criteria, step 508 checks to see if a shortcut representing that file is already displayed on the computer desktop, or if it has been marked as non-temporal. If a shortcut representing that file is already displayed on the computer desktop, there is no reason to create another one and the process loops back to step 502 to wait. Furthermore, if that file is marked as non-temporal, then the process is not allowed to operate on this file so non-temporal files cannot be placed on the computer desktop by the process. Since the process cannot place a shortcut representing this file on the computer desktop, the process loops back to step 502 to wait.
In a step 510, the user is asked if a shortcut should be created for this file. This step is optional. It is desirable, however, to ask the user if a shortcut should be created so the user will not be surprised by the appearance of a new icon on the computer desktop, and to allow the user to avoid clutter on the computer desktop, and optionally to allow the user to position the icon on the computer desktop. In a step 512, if the user indicates that a shortcut should not be created, the process loops back to step 502 to wait. If the user indicates that a shortcut should be created, a shortcut is created and an icon representing the file is placed on the computer desktop in a step 514. The process then loops back to step 502 to wait.
Files may be marked as temporal or non-temporal by the user through a variety of means well known in the art. For example, a default setting that marks all files ending with the “.EXE” as temporal could be used. This default could be overridden by a variety of means well known in the art such as a “properties” dialog box.
FIG. 5B is a flow chart that summarizes the steps that may be used to automatically, or semi-automatically create a shortcut for frequently accessed files at the time they are accessed by the user and place a representation of that shortcut on the computer desktop. All, or part, of these steps may be done by the GUI, the operating system, a low-level process running in the background, an application, or any combination of the preceding. In a step 503, the process waits until a file is accessed by the user via the GUI. In a step 505 the desktop event log is examined to see if that particular file meets the criteria for creating a shortcut. If that particular file has been accessed by the user through the GUI more than a specified threshold number of times within a specified period, it meets the criteria for creating a shortcut. The specified period may be measured in time units, or in GUI commands. Examining the desktop event log may be accomplished by successively looking at portions of the log that represent the specified period and then counting the number of time that file occurs to see if there are more than the specified threshold number of occurrences of that file in that portion of the desktop event log. There are many other ways that are well known in art to examine the desktop event log to see if that particular file has been accessed more than a specified threshold number of times within a specified period.
The specified period, and the specified threshold number of times that the file must occur in the desktop event log within that specified period before it is considered for the creation of a shortcut may both be initially set to a default values. However, it is desirable to let the user adjust those values through a variety of means that are well known in the art. One such example is a “control panel” program that is used to set system parameters.
In a step 507, if that file does not meet the criteria for creating a shortcut, the process loops back to step 503 to wait. If a file meets the criteria, step 508 checks to see if a shortcut representing that file is already displayed on the computer desktop, or if it has been marked as non-temporal. If a shortcut representing that file is already displayed on the computer desktop, there is no reason to create another one and the process loops back to step 503 to wait. Furthermore, if that file is marked as non-temporal, then the process is not allowed to operate on this file so non-temporal files cannot be placed on the computer desktop by the process. Since the process cannot place a shortcut representing this file on the computer desktop, the process loops back to step 503 to wait.
In a step 510, the user is asked if a shortcut should be created for this file. This step is optional. It is desirable, however, to ask the user if a shortcut should be created so the user will not be surprised by the appearance of a new icon on the computer desktop, and to allow the user to avoid clutter on the computer desktop, and optionally to allow the user to position the icon on the computer desktop. In a step 512, if the user indicates that a shortcut should not be created, the process loops back to step 503 to wait. If the user indicates that a shortcut should be created, a shortcut is created and an icon representing the file is placed on the computer desktop in a step 514. The process then loops back to step 503 to wait.
FIG. 6 is a flow chart that summarizes the steps that may be used to automatically, or semi-automatically remove objects on the computer desktop that are infrequently used. All, or part, of these steps may be done by the GUI, the operating system, a low-level process running in the background, an application, or any combination of the preceding. In a step 602 an interval is waited. This interval may be measured in time units, as a predetermined number of GUI commands, or as a predetermined number of boot-ups or logins. It may also be desirable to wait until the computer 100 is mostly idle so that the process to remove items from the computer desktop does not slow the execution of other computer tasks. In a step 604 an item that appears on the computer desktop is selected. In a step 606 the process checks to see if the item has been marked as non-temporal. If the item has been marked non-temporal, then it will not be removed from the computer desktop even if it has not been used in a long time and the process will proceed to a step 608 to see if this is the last item on the computer desktop to be considered for removal. If it is not the last item, the process proceeds to step 604 to select another item on the computer desktop to consider for removal.
If the item was not marked as non-temporal (i.e. marked as temporal), step 610 checks the desktop event log, or some other usage information, to see if the last usage of that item was more than a specified threshold amount of time ago. This threshold amount of time may be measured in time units, as a predetermined number of GUI commands, or as a predetermined number of boot-ups or logins. If the item has been used more recently than the specified threshold amount of time, then the process proceeds to step 608. If the item has not been used more recently than the threshold amount of time, then the process proceeds to step 612 where the user is asked if that item should be removed from the computer desktop completely, or removed from the computer desktop and placed in the stack. This step is optional. It is desirable, however, to ask the user if this item should be removed so the user will not be surprised by the disappearance of an item on the computer desktop. It is also desirable to ask the user whether the item should be removed completely, or whether it should just be moved to a special location where it may be easily retrieved and placed back on the computer desktop. This special location, called a stack, may contain many items that have been removed from the computer desktop. This stack is analogous to a stack of papers that accumulate on a physical desktop. An appropriate icon representing the stack may be displayed on the computer desktop to allow the user to easily access these items that have been removed from the computer desktop and to retrieve items from the stack and place them back on the computer desktop.
In a step 614, if the user indicated that the item should not be removed, the process loops back to step 608. If the user indicated that the item should be removed, then in a step 616, the process follows the user's instructions and removes the item completely, or places the item in the stack. If optional step 612 is not executed, step 616 would always be completed and the item would either be removed completely, or removed and placed in the stack depending on the desired default operation specified.
FIG. 7 illustrates an example of a dialog box 330 displayed on screen 108 that can be used to ask the user if an item should be removed from the computer desktop. A graphical representation of the item as it is displayed on the computer desktop 702 is displayed along with text 704 that explains the choice the user needs to make. The user may then choose to remove the item by positioning the cursor over the “YES” button 333 and depressing a mouse button. Alternatively, the user may choose to keep the item on the computer desktop by positioning the cursor over the “NO” button 335 and depressing a mouse button.
The above description is included to illustrate the preferred embodiments. It is not meant to limit the scope of the invention. The scope of the invention is to be limited only by the following claims. From the above discussion, many variations will be apparent to one skilled in the art that would yet be encompassed by the spirit and scope of the invention.

Claims (18)

What is claimed is:
1. A computer operable method, comprising the steps of:
(a) automatically selecting a file that satisfies a first set of criteria, said first set of criteria defining when said file has been selected by a user more frequently than a first frequency, wherein selections comprise icon selections and dialog box selections:
(b) automatically displaying an icon representing said file on a computer screen after said file has been selected, wherein said icon was not displayed immediately prior to selection.
2. The method of claim 1, wherein said first frequency is defined as when said file has been selected more than a specified number of times in less than a specified amount of time.
3. The method of claim 2, further comprising the step of:
(c) keeping a log of files selected in a desktop event log, wherein said files selected include program files selected to be executed and data files selected to perform other operations using those files and wherein said files selected comprise files whose selection is initiated by a graphical user interface (GUI).
4. The method of claim 2, wherein step (b) includes:
(b.1) prompting a user for a user response; and
(b.2) creating a shortcut represented by said icon in response to said user response.
5. The method of claim 2, wherein a user may set a first property associated with a specific file to prevent said first set of criteria from being satisfied for said specific file.
6. The method of claim 5, wherein a user may set said first property for a group of files.
7. A program storage medium readable by a computer, tangibly embodying a program of instructions executable by the computer to perform method steps for automatically displaying an icon representing a file that is frequently selected by a graphical user interface (GUI), said method steps comprising:
(a) automatically selecting a file that satisfies a first set of criteria, said first set of criteria defining when said file has been selected by a user more frequently than a first frequency, wherein selections comprise icon selections and dialog box selections;
(b) automatically displaying an icon representing said file on a computer screen after said file has been selected, wherein said icon was not displayed immediately prior to selection.
8. The program storage medium of claim 7, wherein said first frequency is defined as when said file has been selected more than a specified number of times in less than a specified amount of time.
9. The program storage medium of claim 8, further comprising the step of:
(c) keeping a log of files selected in a desktop event log, wherein said files selected include program files selected to perform other operations using those files and wherein said files selected comprise files whose selection is initiated by a graphical user interface (GUI).
10. The method of claim 8, wherein step (b) includes:
(b.1) prompting a user for a user response; and
(b.2) creating a shortcut represented by said icon in response to said user response.
11. The program storage medium of claim 8, wherein a user may set a first property associated with a specific file to prevent said first set of criteria from being satisfied for said specific file.
12. The program storage medium of claim 11, wherein a user may set said first property for a group of files.
13. A graphical user interface (GUI) that is implemented on a computer, comprising:
(a) means for automatically selecting a file that satisfies a first set of criteria, said first set of criteria defining when said file has been used frequently;
(b) means for automatically displaying an icon representing said file on a computer screen after said file has been selected, wherein said icon was not displayed immediately prior to selection.
14. The graphical user interface of claim 13, wherein said first set of criteria is satisfied when said file has been selected more than a specified number of times in less than a specified amount of time.
15. The graphical user interface of claim 14, further comprising:
(c) means for keeping a log of files selected in a desktop event log, wherein said files selected include program files selected to be executed and data files selected to perform other operations using those files and wherein said files selected comprise files whose selection is initiated by said graphical user interface (GUI).
16. The graphical user interface of claim 14, wherein said means for displaying includes:
(b.1) means for prompting a user for a user response; and
(b.2) means for creating a shortcut represented by said icon in response to said user response.
17. The graphical user interface of claim 14, wherein a user may set a first property associated with a specific file to prevent said first set of criteria from being satisfied for said specific file.
18. The graphical user interface of claim 17, wherein a user may set said first property for a group of files.
US09/006,238 1998-01-13 1998-01-13 Temporal desktop agent Expired - Fee Related US6377286B1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US09/006,238 US6377286B1 (en) 1998-01-13 1998-01-13 Temporal desktop agent
US10/077,387 US20020075319A1 (en) 1998-01-13 2002-02-15 Temporal desktop agent

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US09/006,238 US6377286B1 (en) 1998-01-13 1998-01-13 Temporal desktop agent

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US10/077,387 Division US20020075319A1 (en) 1998-01-13 2002-02-15 Temporal desktop agent

Publications (1)

Publication Number Publication Date
US6377286B1 true US6377286B1 (en) 2002-04-23

Family

ID=21719952

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/006,238 Expired - Fee Related US6377286B1 (en) 1998-01-13 1998-01-13 Temporal desktop agent
US10/077,387 Abandoned US20020075319A1 (en) 1998-01-13 2002-02-15 Temporal desktop agent

Family Applications After (1)

Application Number Title Priority Date Filing Date
US10/077,387 Abandoned US20020075319A1 (en) 1998-01-13 2002-02-15 Temporal desktop agent

Country Status (1)

Country Link
US (2) US6377286B1 (en)

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020122076A1 (en) * 2001-03-05 2002-09-05 Fujitsu Limited Automatic creation and deletion of shortcut icons
US6498613B1 (en) * 1999-02-19 2002-12-24 Casio Computer Co., Ltd. Menu display apparatus capable of varying menu display area and total menu item number displayed on cabinet holder image, and program storage medium
US20030007010A1 (en) * 2001-04-30 2003-01-09 International Business Machines Corporation Providing alternate access for physically impaired users to items normally displayed in drop down menus on user-interactive display interfaces
US20050015728A1 (en) * 2003-07-17 2005-01-20 International Business Machines Corporation Method, system, and program product for customizing a user interface
US20050204310A1 (en) * 2003-10-20 2005-09-15 Aga De Zwart Portable medical information device with dynamically configurable user interface
US20060004698A1 (en) * 2004-06-30 2006-01-05 Nokia Corporation Automated prioritization of user data files
US20060187483A1 (en) * 2005-02-21 2006-08-24 Canon Kabushiki Kaisha Information processing apparatus and image generating apparatus and control method therefor
US20060212497A1 (en) * 2005-03-18 2006-09-21 Konica Minolta Business Technologies, Inc. Document administration apparatus, and recording medium in which document administration program is stored
US20070013672A1 (en) * 2005-07-18 2007-01-18 Samsung Electronics Co., Ltd. Method and apparatus for providing touch screen user interface, and electronic devices including the same
US20070083829A1 (en) * 2005-10-11 2007-04-12 International Business Machines Corporation Application program initiation with initial display selection
US20080313567A1 (en) * 2007-06-14 2008-12-18 Novell, Inc. System and Method for Providing Dynamic Prioritization and Importance Filtering of Computer Desktop Icons and Program Menu Items
US20090083663A1 (en) * 2007-09-21 2009-03-26 Samsung Electronics Co. Ltd. Apparatus and method for ranking menu list in a portable terminal
US20090113345A1 (en) * 2007-10-30 2009-04-30 Sony Corporation And Sony Electronics Inc. Automatically culled cross-menu bar
US20090150814A1 (en) * 2007-12-06 2009-06-11 Sony Corporation Dynamic update of a user interface based on collected user interactions
US20090219550A1 (en) * 2008-02-29 2009-09-03 Burton Lee Levin Interface for Building a Print Container
US7620894B1 (en) * 2003-10-08 2009-11-17 Apple Inc. Automatic, dynamic user interface configuration
US20090307242A1 (en) * 2008-06-06 2009-12-10 Canon Kabushiki Kaisha Document managing system, document managing method, and computer program
US20100042937A1 (en) * 2008-08-13 2010-02-18 Microsoft Corporation Activities Operating on Structured Data
US20100180231A1 (en) * 2008-07-23 2010-07-15 The Quantum Group, Inc. System and method for personalized fast navigation
US20100211872A1 (en) * 2009-02-17 2010-08-19 Sandisk Il Ltd. User-application interface
US20110242024A1 (en) * 2010-03-30 2011-10-06 Tetsuo Fukumoto Operation console enabling appropriate selection of operational mode by the user, electronic device and image processing apparatus provided with the operation console, and method of displaying information on the operation console
US20130042205A1 (en) * 2010-04-09 2013-02-14 Sony Computer Entertainment Inc. Information processing apparatus
US20140137018A1 (en) * 2012-11-09 2014-05-15 Sap Ag File position shortcut and window arrangement
US20140298203A1 (en) * 2013-03-28 2014-10-02 Linkedln Corporation Likelihood-based personalized navigation system and method
US20140365948A1 (en) * 2011-12-28 2014-12-11 Panasonic Corporation Image display control device, and image display control method
US20150007343A1 (en) * 2009-02-18 2015-01-01 Canon Kabushiki Kaisha Shortcut management unit and method, and storage medium
US20150245073A1 (en) * 2000-06-09 2015-08-27 Seiko Epson Corporation Creation of image designating file and reproduction of image using same
USD746302S1 (en) * 2013-09-03 2015-12-29 Samsung Electronics Co., Ltd. Display screen or portion thereof with graphical user interface
WO2016108801A1 (en) * 2014-12-29 2016-07-07 Echostar Ukraine, L.L.C. Device-specific feature recommendations
US10162477B2 (en) 2008-07-23 2018-12-25 The Quantum Group, Inc. System and method for personalized fast navigation
CN110209443A (en) * 2018-03-05 2019-09-06 腾讯科技(深圳)有限公司 Session information processing method, device and storage equipment
US20220100299A1 (en) * 2020-09-30 2022-03-31 Business Objects Software Limited System and method for intelligent polymorphism of user interface

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000207263A (en) * 1998-11-12 2000-07-28 Sony Corp Processor and method for information processing and providing medium
JP2005173964A (en) * 2003-12-11 2005-06-30 Casio Comput Co Ltd Function calling device and program for process of calling function
GB2428834A (en) * 2005-08-04 2007-02-07 Ibm Linking objects with graphical user interface items
JP4347303B2 (en) * 2006-01-23 2009-10-21 シャープ株式会社 Information processing apparatus, program, and recording medium
US20090049389A1 (en) * 2007-08-13 2009-02-19 Siemens Medical Solutions Usa, Inc. Usage Pattern Driven Graphical User Interface Element Rendering
KR20130041484A (en) * 2011-10-17 2013-04-25 삼성전자주식회사 Method and apparatus for operating menu screen of user device
JPWO2014006946A1 (en) * 2012-07-04 2016-06-02 日本電気株式会社 Information processing apparatus, control method therefor, and program
KR20170017280A (en) * 2015-08-06 2017-02-15 엘지전자 주식회사 Mobile terminal and method for controlling the same
US10523756B1 (en) * 2017-03-01 2019-12-31 Amazon Technologies, Inc. Network service for identifying infrequently accessed data in a data stream
US11307734B1 (en) * 2020-12-18 2022-04-19 Securas Technologies, LLC Dynamic controlled-environment facility resident communication and/or media device user interfaces

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5241655A (en) * 1988-11-15 1993-08-31 Hitachi, Ltd. Menu presentation method and data processing apparatus
US5367626A (en) * 1989-11-08 1994-11-22 Fujitsu Limited Automatic icon generation system
US5491795A (en) * 1993-05-04 1996-02-13 International Business Machines Corporation Window management system with a hierarchical iconic array and miniature windows
US5564004A (en) * 1994-04-13 1996-10-08 International Business Machines Corporation Method and system for facilitating the selection of icons
US5673405A (en) * 1992-12-08 1997-09-30 Tokyo Seimitsu Co., Ltd. Icon relocation system and method thereof
US5692143A (en) 1994-12-30 1997-11-25 International Business Machines Corporation Method and system for recalling desktop states in a data processing system
US5694563A (en) * 1994-12-13 1997-12-02 Microsoft Corporation Method and system for transferring data to common destinations using a common destination list
US5805159A (en) * 1996-08-22 1998-09-08 International Business Machines Corporation Mobile client computer interdependent display data fields
US6091409A (en) * 1995-09-11 2000-07-18 Microsoft Corporation Automatically activating a browser with internet shortcuts on the desktop

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5420975A (en) * 1992-12-28 1995-05-30 International Business Machines Corporation Method and system for automatic alteration of display of menu options
JPH07302185A (en) * 1994-03-01 1995-11-14 Microsoft Corp Folder rack icon

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5241655A (en) * 1988-11-15 1993-08-31 Hitachi, Ltd. Menu presentation method and data processing apparatus
US5367626A (en) * 1989-11-08 1994-11-22 Fujitsu Limited Automatic icon generation system
US5673405A (en) * 1992-12-08 1997-09-30 Tokyo Seimitsu Co., Ltd. Icon relocation system and method thereof
US5491795A (en) * 1993-05-04 1996-02-13 International Business Machines Corporation Window management system with a hierarchical iconic array and miniature windows
US5564004A (en) * 1994-04-13 1996-10-08 International Business Machines Corporation Method and system for facilitating the selection of icons
US5694563A (en) * 1994-12-13 1997-12-02 Microsoft Corporation Method and system for transferring data to common destinations using a common destination list
US5692143A (en) 1994-12-30 1997-11-25 International Business Machines Corporation Method and system for recalling desktop states in a data processing system
US6091409A (en) * 1995-09-11 2000-07-18 Microsoft Corporation Automatically activating a browser with internet shortcuts on the desktop
US5805159A (en) * 1996-08-22 1998-09-08 International Business Machines Corporation Mobile client computer interdependent display data fields

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
"Microsoft Press Computer Dictionary, Third Edition", Microsoft Corporation, 1997.* *
Alan Simpson, Windows 95 Uncut, IDG Books Worldwide, pp. 84-91, 1995.* *
Alan Simpson, Windows 95 Uncut, IDG Books, 1995, pp. 78-95 and pp. 151-161 . .* *
Microsoft Windows NT, 1996. *
Robert Cowart, Mastering Windows 3.1 Special Edition, Sybex, pp. 48-67, 1992.* *

Cited By (54)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6498613B1 (en) * 1999-02-19 2002-12-24 Casio Computer Co., Ltd. Menu display apparatus capable of varying menu display area and total menu item number displayed on cabinet holder image, and program storage medium
US20150245073A1 (en) * 2000-06-09 2015-08-27 Seiko Epson Corporation Creation of image designating file and reproduction of image using same
US20020122076A1 (en) * 2001-03-05 2002-09-05 Fujitsu Limited Automatic creation and deletion of shortcut icons
US20030007010A1 (en) * 2001-04-30 2003-01-09 International Business Machines Corporation Providing alternate access for physically impaired users to items normally displayed in drop down menus on user-interactive display interfaces
US20050015728A1 (en) * 2003-07-17 2005-01-20 International Business Machines Corporation Method, system, and program product for customizing a user interface
US7620894B1 (en) * 2003-10-08 2009-11-17 Apple Inc. Automatic, dynamic user interface configuration
US20050204310A1 (en) * 2003-10-20 2005-09-15 Aga De Zwart Portable medical information device with dynamically configurable user interface
WO2005043303A3 (en) * 2003-10-20 2005-12-29 Zoll Medical Corp Portable medical information device with dynamically configurable user interface
US20060004698A1 (en) * 2004-06-30 2006-01-05 Nokia Corporation Automated prioritization of user data files
US20060187483A1 (en) * 2005-02-21 2006-08-24 Canon Kabushiki Kaisha Information processing apparatus and image generating apparatus and control method therefor
US7913189B2 (en) * 2005-02-21 2011-03-22 Canon Kabushiki Kaisha Information processing apparatus and control method for displaying user interface
US20060212497A1 (en) * 2005-03-18 2006-09-21 Konica Minolta Business Technologies, Inc. Document administration apparatus, and recording medium in which document administration program is stored
US7953702B2 (en) * 2005-03-18 2011-05-31 Konica Minolta Business Technologies, Inc. Document administration apparatus, and recording medium in which document administration program is stored
US20070013672A1 (en) * 2005-07-18 2007-01-18 Samsung Electronics Co., Ltd. Method and apparatus for providing touch screen user interface, and electronic devices including the same
US7761810B2 (en) * 2005-07-18 2010-07-20 Samsung Electronics Co., Ltd. Method and apparatus for providing touch screen user interface, and electronic devices including the same
US20070083829A1 (en) * 2005-10-11 2007-04-12 International Business Machines Corporation Application program initiation with initial display selection
US20080313567A1 (en) * 2007-06-14 2008-12-18 Novell, Inc. System and Method for Providing Dynamic Prioritization and Importance Filtering of Computer Desktop Icons and Program Menu Items
US8595647B2 (en) * 2007-06-14 2013-11-26 Novell, Inc. System and method for providing dynamic prioritization and importance filtering of computer desktop icons and program menu items
US20090083663A1 (en) * 2007-09-21 2009-03-26 Samsung Electronics Co. Ltd. Apparatus and method for ranking menu list in a portable terminal
US8683383B2 (en) * 2007-10-30 2014-03-25 Sony Corporation Automatically culled cross-menu bar
US20090113345A1 (en) * 2007-10-30 2009-04-30 Sony Corporation And Sony Electronics Inc. Automatically culled cross-menu bar
US8984441B2 (en) * 2007-12-06 2015-03-17 Sony Corporation Dynamic update of a user interface based on collected user interactions
US20090150814A1 (en) * 2007-12-06 2009-06-11 Sony Corporation Dynamic update of a user interface based on collected user interactions
US20090219550A1 (en) * 2008-02-29 2009-09-03 Burton Lee Levin Interface for Building a Print Container
US8023135B2 (en) * 2008-02-29 2011-09-20 Sharp Laboratories Of America, Inc. Interface for building a print container
US20090307242A1 (en) * 2008-06-06 2009-12-10 Canon Kabushiki Kaisha Document managing system, document managing method, and computer program
US8370308B2 (en) * 2008-06-06 2013-02-05 Canon Kabushiki Kaisha Document management system, document management method, and computer program for forming proxy data for deleted documents
US10162477B2 (en) 2008-07-23 2018-12-25 The Quantum Group, Inc. System and method for personalized fast navigation
US20100180231A1 (en) * 2008-07-23 2010-07-15 The Quantum Group, Inc. System and method for personalized fast navigation
US8762884B2 (en) * 2008-07-23 2014-06-24 The Quantum Group, Inc. System and method for personalized fast navigation
US9396281B2 (en) * 2008-08-13 2016-07-19 Microsoft Technology Licensing, Llc Activities operating on structured data
US20100042937A1 (en) * 2008-08-13 2010-02-18 Microsoft Corporation Activities Operating on Structured Data
US20100211872A1 (en) * 2009-02-17 2010-08-19 Sandisk Il Ltd. User-application interface
US9176747B2 (en) 2009-02-17 2015-11-03 Sandisk Il Ltd. User-application interface
US9361434B2 (en) * 2009-02-18 2016-06-07 Canon Kabushiki Kaisha Shortcut management unit and method, and storage medium
US20150007343A1 (en) * 2009-02-18 2015-01-01 Canon Kabushiki Kaisha Shortcut management unit and method, and storage medium
US20110242024A1 (en) * 2010-03-30 2011-10-06 Tetsuo Fukumoto Operation console enabling appropriate selection of operational mode by the user, electronic device and image processing apparatus provided with the operation console, and method of displaying information on the operation console
US9024888B2 (en) * 2010-03-30 2015-05-05 Sharp Kabushiki Kaisha Operation console enabling appropriate selection of operational mode by the user, electronic device and image processing apparatus provided with the operation console, and method of displaying information on the operation console
US10268934B2 (en) 2010-03-30 2019-04-23 Sharp Kabushiki Kaisha Operation console enabling appropriate selection of operational mode by the user, electronic device and image processing apparatus provided with the operation console, and method of displaying information on the operation console
US20130042205A1 (en) * 2010-04-09 2013-02-14 Sony Computer Entertainment Inc. Information processing apparatus
US10191642B2 (en) * 2010-04-09 2019-01-29 Sony Interactive Entertainment Inc. Information processing apparatus for navigating and selecting programs
US10642444B2 (en) * 2011-12-28 2020-05-05 Panasonic Intellectual Property Management Co., Ltd. Image display control device, and image display control method
US20140365948A1 (en) * 2011-12-28 2014-12-11 Panasonic Corporation Image display control device, and image display control method
US20140137018A1 (en) * 2012-11-09 2014-05-15 Sap Ag File position shortcut and window arrangement
US9582133B2 (en) * 2012-11-09 2017-02-28 Sap Se File position shortcut and window arrangement
US20140298203A1 (en) * 2013-03-28 2014-10-02 Linkedln Corporation Likelihood-based personalized navigation system and method
US9189139B2 (en) * 2013-03-28 2015-11-17 Linkedin Corporation Likelihood-based personalized navigation system and method
USD746302S1 (en) * 2013-09-03 2015-12-29 Samsung Electronics Co., Ltd. Display screen or portion thereof with graphical user interface
WO2016108801A1 (en) * 2014-12-29 2016-07-07 Echostar Ukraine, L.L.C. Device-specific feature recommendations
US10904623B2 (en) 2014-12-29 2021-01-26 Dish Ukraine L.L.C. Device-specific feature recommendations
CN110209443A (en) * 2018-03-05 2019-09-06 腾讯科技(深圳)有限公司 Session information processing method, device and storage equipment
CN110209443B (en) * 2018-03-05 2021-08-03 腾讯科技(深圳)有限公司 Session information processing method and device and storage equipment
US20220100299A1 (en) * 2020-09-30 2022-03-31 Business Objects Software Limited System and method for intelligent polymorphism of user interface
US11842024B2 (en) * 2020-09-30 2023-12-12 Business Objects Software Ltd. System and method for intelligent polymorphism of user interface

Also Published As

Publication number Publication date
US20020075319A1 (en) 2002-06-20

Similar Documents

Publication Publication Date Title
US6377286B1 (en) Temporal desktop agent
US6046741A (en) Visual command sequence desktop agent
US8799813B2 (en) Method and system for providing an embedded application tool bar
JP5112331B2 (en) User customizable drop-down control list for GUI software applications
US6111575A (en) Graphical undo/redo manager and method
US7346855B2 (en) Method and system for switching between multiple computer applications
US6072486A (en) System and method for creating and customizing a deskbar
US5828376A (en) Menu control in a graphical user interface
US6201539B1 (en) Method and system for customizing a data processing system graphical user interface
US6621532B1 (en) Easy method of dragging pull-down menu items onto a toolbar
US8140971B2 (en) Dynamic and intelligent hover assistance
EP0970416B1 (en) Method and apparatus for configuring sliding panels
US6121965A (en) User interface for graphical application tool
US5801693A (en) "Clear" extension to a paste command for a clipboard function in a computer system
US5760776A (en) Menu editor for a graphical user interface
EP0972253B1 (en) Method and apparatus for accessing information and items across multiple workspaces
US5754809A (en) Perspective windowing technique for computer graphical user interface
US7509348B2 (en) Radially expanding and context-dependent navigation dial
US5664133A (en) Context sensitive menu system/menu behavior
US7913183B2 (en) System and method for managing software applications in a graphical user interface
US6393429B1 (en) File handling device, and a recording medium storing a file handling program
JP4270391B2 (en) Multimedia file tooltip
US20010035881A1 (en) Method and system for reducing notification area clutter
JPH0685145B2 (en) How to display the position of multiple selected objects
WO1999066394A1 (en) Method for adapting user interface elements based on historical usage

Legal Events

Date Code Title Description
AS Assignment

Owner name: HEWLETT-PACKARD COMPANY, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HOCHMUTH, ROLAND M.;REEL/FRAME:009173/0676

Effective date: 19980113

AS Assignment

Owner name: HEWLETT-PACKARD COMPANY, COLORADO

Free format text: MERGER;ASSIGNOR:HEWLETT-PACKARD COMPANY;REEL/FRAME:011523/0469

Effective date: 19980520

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

AS Assignment

Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HEWLETT-PACKARD COMPANY;REEL/FRAME:026945/0699

Effective date: 20030131

REMI Maintenance fee reminder mailed
LAPS Lapse for failure to pay maintenance fees
STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20140423